tag:www.gov.uk,2005:/search/guidance-and-regulation Guidance and regulation 2026-04-29T16:08:00+01:00 HM Government tag:www.gov.uk,2005:/guidance/report-a-vulnerability-on-a-defra-system 2026-04-29T16:08:00+01:00 Report a vulnerability on a Defra system How to report a security vulnerability on a Department for Environment, Food and Rural Affairs (Defra) system. tag:www.gov.uk,2005:/government/publications/cyber-resilience-pledge 2026-04-22T09:30:00+01:00 Cyber Resilience Pledge Organisations are invited to take the Cyber Resilience Pledge, which contains 3 actions that will have an immediate positive impact on resilience to cyber attacks. tag:www.gov.uk,2005:/government/publications/industry-security-notices-isns 2026-04-14T15:48:51+01:00 Industry Security Notice (ISN) A list of Industry Security Notices (ISNs) for defence personnel to highlight security changes or information. tag:www.gov.uk,2005:/government/publications/cyberasap-alumni-on-difficulties-for-foreign-nationals-setting-up-a-business-in-the-uk-survey-privacy-notice 2026-04-14T13:34:29+01:00 CyberASAP alumni on difficulties for foreign nationals setting up a business in the UK survey: privacy notice A privacy notice for the survey of Cyber Academic Startup Accelerator programme alumni on difficulties of foreign nationals setting up a business in the UK. tag:www.gov.uk,2005:/government/publications/uk-digital-verification-services-trust-framework-data-schema-1-0 2026-04-13T16:29:59+01:00 UK digital verification services trust framework data schema (1.0) A specification to help DVS and relying parties organise and exchange information in a consistent way to enable interoperability tag:www.gov.uk,2005:/guidance/legal-aid-agency-cyber-security-incident 2026-03-16T14:54:47+00:00 Legal Aid Agency cyber security incident A dedicated space with the latest updates, contingency measures and processes following a cyber attack on the Legal Aid Agency’s online digital services. tag:www.gov.uk,2005:/government/publications/cyber-essentials-scheme-overview 2026-03-13T16:20:49+00:00 Cyber Essentials scheme: overview Cyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats. tag:www.gov.uk,2005:/guidance/cyber-security-model-question-sets 2026-03-10T12:20:10+00:00 Cyber Security Model Question Sets Supplier Assurance Questionnaire (SAQ) and Flow Down Risk Assessment (RA) Question sets. tag:www.gov.uk,2005:/government/publications/uk-digital-verification-services-trust-framework-1-0 2026-03-06T16:01:32+00:00 UK digital verification services trust framework (1.0) A pre-release of the next version of the UK digital verification services trust framework. tag:www.gov.uk,2005:/government/publications/how-to-check-someones-identity-1-0 2026-03-06T16:00:58+00:00 How to check someone's identity (1.0) This guidance, also known as Good Practice Guide (GPG) 45, helps you decide how to check, or ask others to check, the identity of those you interact with. tag:www.gov.uk,2005:/government/publications/how-to-use-authenticators-to-protect-an-online-service-1-0 2026-03-06T16:00:23+00:00 How to use authenticators to protect an online service (1.0) This guidance, also known as Good Practice Guide (GPG) 44, will help you choose an authenticator that will give you the level of protection that’s most suitable for users accessing your service. tag:www.gov.uk,2005:/government/publications/how-to-create-a-vouch-as-evidence-of-someones-identity-1-0 2026-03-06T15:59:54+00:00 How to create a vouch as evidence of someone’s identity (1.0) Guidance on creating, storing and checking evidence of someone’s identity that relies on a ‘vouch’, a formal declaration from a third-party that knows them and is willing to confirm their identity. tag:www.gov.uk,2005:/government/publications/how-to-create-bind-and-share-attributes-1-0 2026-03-06T15:59:18+00:00 How to create, bind and share attributes (1.0) Guidance on creating, binding, scoring and sharing attributes for organisations certified against the UK digital verification services trust framework as an attribute service provider, or interested in understanding more abo… tag:www.gov.uk,2005:/government/publications/how-to-check-whether-someone-has-delegated-authority-1-0 2026-03-06T15:58:54+00:00 How to check whether someone has delegated authority (1.0) Guidance for services certified against the UK digital verification services trust framework who offer delegated authority as part of their service. tag:www.gov.uk,2005:/government/publications/supplementary-code-for-digital-right-to-work-checks-1-0 2026-03-06T15:57:49+00:00 Supplementary code for digital right to work checks (1.0) A pre-release of the next version of the supplementary code for digital right to work checks tag:www.gov.uk,2005:/government/publications/supplementary-code-for-digital-right-to-rent-checks-1-0 2026-03-06T15:57:14+00:00 Supplementary code for digital right to rent checks (1.0) A pre-release of the next version of the supplementary code for digital right to rent checks tag:www.gov.uk,2005:/government/publications/supplementary-code-for-disclosure-and-barring-service-digital-identity-checks-1-0 2026-03-06T15:56:36+00:00 Supplementary code for Disclosure and Barring Service digital identity checks (1.0) A pre-release of the next version of the supplementary code for Disclosure and Barring Service digital identity checks tag:www.gov.uk,2005:/government/publications/launch-of-the-global-coalition-on-telecoms-6g-security-and-resilience-principles 2026-03-03T11:39:19+00:00 Launch of the Global Coalition on Telecoms 6G Security and Resilience Principles At Mobile World Congress 2026, the Global Coalition on Telecoms (GCOT) launched security and resilience principles for 6G. tag:www.gov.uk,2005:/government/publications/global-coalition-on-telecoms-security-and-resilience-principles-for-6g 2026-03-03T09:30:00+00:00 Global Coalition on Telecoms: Security and Resilience Principles for 6G Security and Resilience Principles for 6G from the governments of the Global Coalition on Telecoms (GCOT). tag:www.gov.uk,2005:/government/publications/defence-research-security 2026-02-23T09:59:39+00:00 Defence research security Researchers should use this guidance to understand the security measures you need to follow and how to apply them when working with defence research.